About your Search

20121101
20121130
Search Results 0 to 4 of about 5
to the pentagon and ig on the one hand and to the fbi with regards to general petraeus. >> but he's not, i mean big picture watching this, shaking his head saying, guys, we need a more sense of leadership here? >> he's not going to make a grand pronouncement or decisions about things based on, you know, two situations, two individual cases. he's focused on the missions that the military's tasked with carrying out and the cia and the general intelligence community tasked with carrying out, and with acting overall agenda which encompasses not just national security policy, but obviously domestic policy. >> thank you. >> yes. >> jay, has the president spoke to general allen directly? >> not that i'm aware of, no. >> spoke with secretary panetta? >> i have to check that. secretary panetta has been traveling. >> as a follow-up question, does the president see this in general as an unwelcomed distraction at a time when she's just -- was re-elected, and he has a bunch of priorities in terms of the fiscal cliff and in terms of the cabinet? >> well, i certainly, i think wouldn't call it welcome, but obv
various leading government officials up there all back that up, including director of the fbi. i'm paraphrasing, but he said these two categories of companies. those that have been compromised and will be gorgeous so delicate. so that's the shocking statistics to take. it is not uncommon for a credit card company to come back to emerge it and say hey, our threat vector detection system is more sophisticated than yours. we are picking up some indications he been compromised. here's what you need to look at. some recent examples of some very high profile and public incidents that have occurred recently. rsa, the cybersecurity company files was breached in 2011 and that led to a number of other breaches because their systems are used by many companies to provide this company's own security systems. in addition, there is a classic financial crimes case involving sony. i think that one of the takeaways from these examples is that these are not -- these are companies technologically sophisticated pressure in the cyberworld and they themselves were reached. so these are wal-marts for co
on the specifics of the investigation. the fbi has its own protocols in terms of how they proceed. and i'm going to let director mueller and others examine those protocols, and make some statements to the public generally. i do want to emphasize what i said before. general petraeus had an extraordinary career. deserved this country with great distinction in iraq, in afghanistan, and as head of the cia. by his own assessment, he did not meet the standards that he felt were necessary as the director of cia with respect to this personal matter that he is now dealing with, with his family, and with his wife. and it's on that basis that he tendered his resignation, and it's on that basis that i accepted it. but i want to emphasize that from my perspective at least, he has provided this country and extraordinary service. we are safer because of the work that dave petraeus has done, and my main hope right now is that he and his family are able to move on, and that this instead of being -- this into a being a single side note on what has been otherwise been an extraordinary career. [inaudible] >> you kn
more problematic. i think one of the other panelists mentioned this quote from fbi director, and you see the same concerns of talking about in the commercial sphere, to. he said basically set to every company is being hacked one way or another and it's not a question of when they will be hacked. it will be a question of when it will happen again. that might be a pessimistic view of how bitter cybersecurity sector can be. it is certainly a theme you see in the space. my only point, the only other point i want to make on commercial data is that you see and report. there was a report issued by verizon about data breach investigation, that suggests that a lease in endears large numbers of serious cyber intrusions intrusions have been aimed at create taking authentication credential, passwords, usernames, things like that. things that can be used for later inclusion's in the future, things that might give an intruder broader access to a network. so i'd like to shift for a moment, those ideas in mind, and talk about offense of cyber operations. and what do we mean by that and what is, what
was founded in coastal town in was on the fbi's most wanted list and responsible for the murders in boston. there is no evidence to suggest that and it's hard to prove that we have the compound that has been translated if there was a smoking gun. if it was a smoking gun proving the relations are not so good that we wouldn't have pointed out. is it the difference it and the diplomats and journalists similar than they know. there is no evidence that i have seen that there was high level complicity or knowledge about him being. this led to the problem this was for the pakistani military and intelligence and a different question that we are talking about. there is to my knowledge no evidence that they do that he was there at that time. >> in 2003 on the two locations al qaeda was at war with the pakistani state and that pakistan the state has been quite helpful and the operational commander of 9/11. they are held on al qaeda when it comes to the taliban as a separate story. i won't let you off the hook. the new america foundation if you're interested in drones to keep track of the drone strike
Search Results 0 to 4 of about 5

Terms of Use (10 Mar 2001)